COMPUTER NETWORKING
COMPUTER NETWORKING
COMPUTER NETWORKS – I :-
1. Basic Concepts of Computer Networks
Q1: What is a computer network? Explain its advantages.
1. Resource Sharing – Devices like printers, scanners, and storage can be shared.
2. Data Sharing – Users can exchange files and information easily.
3. Communication – Email, video conferencing, and instant messaging enhance
communication.
4. Cost-Effective – Reduces hardware and software costs by sharing resources.
5. Centralized Data Management – Data is stored on a central server, reducing
redundancy.
Wired Network – Uses physical cables (Ethernet) for connectivity. More secure and
faster.
Wireless Network – Uses radio waves (Wi-Fi) to transmit data. Offers mobility and
convenience.
A network protocol is a set of rules that govern data communication over a network.
Examples: HTTP, TCP/IP, FTP, SMTP, UDP
2|Page
2. Network Topologies
Q5: Explain bus, star, ring, and mesh topologies with diagrams.
Most Reliable: Mesh Topology – Because it has multiple paths for data transmission.
3. Network Devices
Q6: Functions of network devices
Hub vs Switch: A hub sends data to all devices, while a switch sends data only to the
intended recipient.
Guided Media – Uses cables (e.g., twisted pair, coaxial, fiber optic).
Unguided Media – Uses wireless signals (e.g., radio waves, microwaves, infrared).
Q9: What are radio waves, microwaves, and infrared signals? Where are they
used?
3|Page
6. Network Security
Q14: What is a firewall? How does it help in network security?
4|Page
Cloud computing provides services (storage, software, processing) over the internet.
Advantages:
✔ No hardware cost
✔ Scalable and flexible
✔ Accessible from anywhere
Disadvantages:
✖ Internet dependency
✖ Security risks
COMPUTER NETWORKS – II :-
DNS (Domain Name System) translates domain names (e.g., google.com) into IP addresses
(e.g., 142.250.180.14) for easier browsing.
Example:
VoIP (Voice over Internet Protocol) enables voice calls over the Internet (e.g., WhatsApp
calls, Zoom, Skype).
Advantages:
✔ Cheaper than traditional calls
✔ Works over Wi-Fi or mobile data
✔ Supports video calling
Security Benefits:
✔ Hides user’s IP address
✔ Filters malicious websites
✔ Increases browsing speed by caching data
Phishing is a cyber attack where attackers send fake emails or websites to steal user
credentials.
7|Page
Prevention Methods:
✔ Avoid clicking on unknown links
✔ Use spam filters
✔ Enable two-factor authentication
A VPN (Virtual Private Network) encrypts internet traffic, providing security and
anonymity.
Advantages:
✔ Protects online privacy
✔ Allows access to restricted content
✔ Prevents hacking over public Wi-Fi
Cloud storage allows users to store data on remote servers accessible via the internet.
Examples:
1. Google Drive
2. Dropbox
Q14: What is data redundancy? How does cloud computing handle it?
Data redundancy occurs when the same data is stored in multiple places. Cloud computing
manages redundancy by using backup servers and replication techniques to prevent data
loss.